Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: New Petya Ransomware Spreads via Fake Online Resumes

b2ap3_thumbnail_ransomware_petya_400.jpgNext time you see an unsolicited resume in your email, it’s worth scrutinizing before you just click on it. It could be a nasty new ransomware called Petya.

Petya is a particularly mean-spirited ransomware that hackers use to extort money from their victims. Infection begins with a Windows error, followed by the typical “blue screen of death” reboot, and displays a red skull and crossbones. As the computer restarts, a fraudulent “system check” allows the infection to encrypt the master file table (MFT), so the computer more or less “forgets” where, or even which, files it has.

In addition to doing this, instead of barring access from particular files, Petya locks the user out of their system entirely by overwriting their computer’s master boot record. Once this happens, the computer is rendered useless (you can’t even log in), only displaying a list of demands, an online address to appease those demands in Bitcoin, and finally, a decryption code to regain access to the files.

When the user accesses the payment page, they learn that they have a limited amount of time to purchase their key before the price is doubled--from around an initial cost of .99 Bitcoins, which is equivalent to about $430. While many websites claim that there are commands that will allow the user to skip the lock screen, the MFT will still be encrypted, and the files still useless. Additionally, there’s no guarantee that the decryption key provided upon payment will even solve the problem, potentially leaving the user short $430 and all of their digital files.

Business owners and human resource representatives need to be particularly alert, considering that the preferred method of dispersement for Petya is via email, specifically disguised as what would appear to be a message from someone seeking a job. The message contains a hyperlink that directs to a Dropbox containing a “resume” (an antivirus program-blinding Trojan containing Petya) and a stock photo. With these tactics, Petya had been plaguing German businesses, with no telling when it may spread.

Fortunately, a programmer has come up with a fix to remove Petya without paying any ransom after his father-in-law’s system was targeted. Thanks to some purported carelessness by the authors of this malware, the encryption is crackable. To do so, however, isn’t such a simple task - it requires a second, uninfected hard drive, for starters. So while Petya has been cracked, it is still better to not be a target in the first place.

So how does one avoid such an attack? Mainly vigilance, assisted by Total Tech Care’s security solutions that help detect and block questionable sources. Call 866-348-2602 for more information about products to keep your company safe from the cyber pirates flying a digital skull and bones.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Windows Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Server Save Money Data Recovery Windows 10 Passwords Virtualization Social Media Saving Money Holiday Tech Term Gadgets Chrome Automation Managed Service Managed IT Services Microsoft Office Facebook Computers Cybercrime Operating System Artificial Intelligence BYOD Mobile Device Management Health Networking Internet of Things IT Support Hacking Wi-Fi Covid-19 Information Technology Information Spam Managed Service Provider Alert Remote Office 365 Telephone Systems Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering Mobility Encryption Mobile Computing Applications Application Human Resources Law Enforcement Remote Monitoring Data Breach Big Data Password Money App History Training Paperless Office How To VPN Government Data Storage Patch Management Remote Computing Private Cloud Mobile Office Managed IT Apps Office Tips Blockchain Marketing WiFi IT solutions Gmail Entertainment Google Drive Website Budget Settings Infrastructure Voice over Internet Protocol Two-factor Authentication Avoiding Downtime Vulnerability Windows 7 Word Mouse HaaS Servers Bring Your Own Device Data Management Work/Life Balance Flexibility Data Security Wireless End of Support Managed Services Staff Software as a Service Display Telephone System The Internet of Things Physical Security Lithium-ion battery Education Machine Learning Safety Connectivity Remote Work HIPAA Sports Employee/Employer Relationship Redundancy USB Firewall Keyboard RMM Conferencing Virtual Reality Apple Scam Social Data Protection User Error Save Time Meetings Vendor Management Cleaning Risk Management Hacker Vendor DDoS Shadow IT Samsung Remote Workers Legal SharePoint Internet Exlporer Value Processor Update Printer Spam Blocking Electronic Medical Records Bluetooth Customer Service PDF Hard Drive Google Docs Environment Hiring/Firing Identity Theft Fax Server Proactive IT Computing Best Practice IT Consultant SaaS YouTube Augmented Reality Black Market Fraud Humor Business Intelligence Digital Signage Network Congestion Remote Worker Audit Worker eWaste Document Management Solid State Drive IT Management Cryptocurrency Wireless Technology How to Downtime Botnet IT Plan Procurement Comparison Net Neutrality Workplace Strategy Data storage Wearable Technology Automobile Help Desk Retail Unsupported Software Hard Drives CES Instant Messaging Printing Robot Computing Infrastructure Excel Charger Virus Business Technology Going Green Content Management Biometrics Access Control Compliance Unified Threat Management Virtual Desktop OneNote Computer Care Managed Services Provider Computer Accessories Virtual Assistant Current Events Telephony Authentication Database Battery Audiobook Root Cause Analysis Science Cables Windows Server 2008 R2 Knowledge Music Cameras HBO Customer relationships Touchpad Skype Project Management Email Best Practices Nanotechnology IT Assessment Telecommuting Manufacturing Distributed Denial of Service Politics Customer Relationship Management Advertising Data loss Cortana Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Outlook Computer Tips Analyitcs Start Menu Warranty Virtual CIO Programming OneDrive Notifications Biometric Security Screen Mirroring HVAC Peripheral Loyalty Google Apps Analysis Using Data Books Printer Server Frequently Asked Questions Digital Security Cameras Mobile Administrator Relocation Windows 10s Devices Copiers 5G Antivirus Cast Enterprise Content Management Quick Tip Windows 8 webinar Accountants Emergency Smartwatch IT service Video Games Tip of the week MSP Ergonomics Professional Services Microchip Public Cloud Thought Leadership Development Employer Employee Relationship Credit Cards OLED Worker Commute Experience Password Management PCI DSS Tablet Assessment Password Manager Virtual Machine Fiber Optics Multi-Factor Security Employee Domains Scalability Windows Server 2008 2FA Tools Search Engine Twitter Messaging Cabling Business Owner IaaS Maintenance NIST Policy NarrowBand Television Business Mangement Hypervisor Smart Tech Trend Micro Trending Search Dark mode Bloatware iPhone Addiction SMS Amazon Default App Consultant Procedure Tablets Public Computer Recycling Saving Time Practices Shopping Transportation Google Search Analytics Regulations Wiring dark theme Entrepreneur Files Computer Fan Cache AI Rootkit Amazon Web Services IT Infrastructure Bing Best Available Shortcut Safe Mode FinTech Chromecast Criminal Workers Hosted Computing Social Network Benefits WIndows 7 GDPR Cost Management Social Networking Colocation FENG Wireless Internet Uninterrupted Power Supply Online Shopping Investment File Sharing Employees IBM Employee/Employer Relationships Monitor Inventory Smart Technology Specifications ISP Flash Camera Windows 365 Running Cable Wire Video Conferencing Evernote ROI Travel Shortcuts Software Tips Sales Memory Supercomputer Bitcoin Reputation Emails Personal Streaming Media Millennials Cryptomining User PowerPoint Windows Media Player Sync Printers Point of Sale Content Smart Office Supply Chain Management Tech Support Wireless Charging Techology Monitoring Laptop Batteries Virtual Private Network Windows 8.1 Customers Netflix Digitize Two Factor Authentication Workforce Managing Stress

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code